With the rise of mobile devices in the work place and their access to your business network bringing vulnerability to the integrity of the network and the potential loss of intellectual property (IP) of business data. There is a need for protocols for the management of your employee mobile devices and their security access.